CyberCX Hack Report: Insights from a year of offensive security testing

Threat Advisory. Russian travel sanctions against an additional 120 Australians: Impacts for Australian organisations’ cyber risk

Threat Advisory

Russia travel

Published by CyberCX Intelligence on 21 June 2022

 

CyberCX Intelligence actively monitors cyber implications of the Russia-Ukraine war for Australian and New Zealand organisations. This Threat Advisory advises on cyber risk for Australians sanctioned by Russia on 16 June and the organisations directly connected to them. 

Key Points

  • The Russian government sanctioned 120 Australians on 16 June, indicating a focus on Australia’s defence, government, mining, technology, think tank, higher education, entertainment and media sectors.
  • We assess that this development materially increases cyber risk in the immediate to medium term for the sanctioned individuals and organisations directly connected to them. Key risks include:
    • publicity-focused and/or disruptive cyber attacks, including website defacement and distributed denial-of-service (DDoS) attacks by pro-Russia cyber criminals
    • cyber extortion by pro-Russia cyber criminals, including ransomware and data theft extortion
    • cyber-enabled intimidation of named individuals by pro-Russia groups, especially those involved in public commentary
    • information operations by Russian nation-state actors, including ‘hack and leak’ attacks.
  • This development is consistent with CyberCX’s Threat Advisory Update of 1 March 2022 that assessed that Australian organisations have a higher threat profile if they adopt a public view on the Russia-Ukraine war, or are in sectors equivalent to those targeted in Russia by western sanctions.

The sanctions

Impact on cyber risk

 

Recent Russian and pro-Russia cyber activity related to the Russia-Ukraine war

Recommendations

  • CyberCX Intelligence recommends organisations take a ‘high alert’ stance for the next month and then reassess based on any further activity/inactivity. This could involve:
    • Lowering thresholds for alerts on accounts and devices specific to sanctioned individuals.
    • Applying additional security controls that do not impact the organisations’ ability to do business (e.g. filtering out email attachments that wouldn’t normally be sent to users).
  • We recommend organisations prioritise patching CVE-2022-30190.
  • We further recommend that organisations consider providing additional support to sanctioned individuals, as well as similarly high-profile employees who may not have been named. This could involve:
    • Conducting an open source exposure assessment to understand individuals’ digital footprint and identify any cyber hygiene concerns.
    • Implementing open source monitoring and alerting (across social media, deep and dark web sources) to proactively detect threats to individuals.

 


This Intelligence Update has been prepared by the CyberCX Intelligence Team.

Read more about our practices and insights:

If you need assistance responding to a cyber incident, please contact our investigation and response team here.

 


 

Guide to CyberCX Cyber Intelligence reporting language

CyberCX Cyber Intelligence uses probability estimates and confidence indicators to enable readers to take appropriate action based on our intelligence and assessments.

Probability estimates – reflect our estimate of the likelihood an event or development occurs
Remote chance Highly unlikely Unlikely Real chance Likely Highly likely Almost certain
Less than 5% 5-20% 20-40% 40-55% 55-80% 80-95% 95% or higher

Note, if we are unable to fully assess the likelihood of an event (for example, where information does not exist or is low-quality) we may use language like “may be” or “suggest”.

 Confidence levels – reflect the validity and accuracy of our assessments
Low confidence Moderate confidence High confidence
Assessment based on information that is not from a trusted source and/or that our analysts are unable to corroborate. Assessment based on credible information that is not sufficiently corroborated, or that could be interpreted in various ways. Assessment based on high-quality information that our analysts can corroborate from multiple, different sources.

 


 

1] https://mid.ru/ru/foreign_policy/news/1818118/

2] The Russian sanctions prevent named individuals from entry into Russia. 

3] Even before the sanctions were announced, CyberCX Intelligence had advised that the risks of cyber extortion and other cyber crimes were elevated for high-profile private sector organisations in Australia. The latest sanctions developments exacerbate these risks. See: Threat Advisory Update of 1 March 2022.

4] Doxing refers to obtaining and publishing personal information about an individual online.  

5] https://cert.gov.ua/article/160530


 

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.